PacktPublishing / Learning-Python-for-Forensics-Second-EditionLinks
Learning Python for Forensics, Second Edition, Published by Packt
☆47Updated 2 years ago
Alternatives and similar repositories for Learning-Python-for-Forensics-Second-Edition
Users that are interested in Learning-Python-for-Forensics-Second-Edition are comparing it to the libraries listed below
Sorting:
- Python Digital Forensics [video], published by Packt☆21Updated 2 years ago
- Python Digital Forensics Cookbook, published by Packt☆106Updated 2 years ago
- Learning Python for Forensics by Packt Publishing☆123Updated 2 years ago
- Code for the Python Digital Forensics Cookbook☆64Updated 7 years ago
- Digital Forensics with Kali Linux, published by Packt☆96Updated 2 years ago
- Hands-On Penetration Testing with Python, published by Packt☆83Updated last year
- Advanced Malware Analysis [video], published by Packt☆21Updated 2 years ago
- Python Digital Forensics Cookbook by Packt☆17Updated 5 years ago
- ☆91Updated this week
- Penetration Testing with Shellcode, published by Packt☆36Updated 3 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆75Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- ☆24Updated 5 years ago
- A repo to support the book☆45Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Malware Analysis Techniques, published by Packt☆76Updated 2 years ago
- Mastering Malware Analysis, published by Packt☆40Updated 2 years ago
- Tools for DFIR☆120Updated 7 years ago
- ☆24Updated 4 years ago
- Python Penetration Testing for Developers, published by Packt☆40Updated 2 years ago
- A quick reference guide for python script development in DFIR☆18Updated last year
- Best practices in threat intelligence☆48Updated 2 years ago
- Digital Forensics with Kali Linux, Second Edition, Published by Packt☆13Updated 4 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆30Updated 4 years ago
- The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential …☆39Updated 12 years ago
- ATT&CK Evaluations website (DEPRECATED)☆60Updated 4 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆66Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Linux Incident Response☆90Updated 6 years ago